Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0124 - Security Advisory
Issued:
2013-01-08
Updated:
2013-01-08

RHSA-2013:0124 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: net-snmp security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated net-snmp packages that fix one security issue and multiple bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

These packages provide various libraries and tools for the Simple Network
Management Protocol (SNMP).

An out-of-bounds buffer read flaw was found in the net-snmp agent. A remote
attacker with read privileges to a Management Information Base (MIB)
subtree handled by the "extend" directive (in "/etc/snmp/snmpd.conf") could
use this flaw to crash snmpd via a crafted SNMP GET request.
(CVE-2012-2141)

Bug fixes:

  • Devices that used certain file systems were not reported in the

"HOST-RESOURCES-MIB::hrStorageTable" table. As a result, the snmpd daemon
did not recognize devices using tmpfs, ReiserFS, and Oracle Cluster File
System (OCFS2) file systems. This update recognizes these devices and
reports them in the "HOST-RESOURCES-MIB::hrStorageTable" table.
(BZ#754652, BZ#755958, BZ#822061)

  • The snmptrapd (8) man page did not correctly describe how to load

multiple configuration files using the "-c" option. This update describes
correctly that multiple configuration files must be separated by a comma.
(BZ#760001)

  • Integers truncated from 64 to 32-bit were not correctly evaluated. As a

consequence, the snmpd daemon could enter an endless loop when encoding the
truncated integers to network format. This update modifies the underlying
code so that snmpd correctly checks truncated 64-bit integers. Now, snmpd
avoids an endless loop. (BZ#783892)

  • snmpd did not correctly check for interrupted system calls when

enumerating existing IPv6 network prefixes during startup. As a
consequence, snmpd could prematurely exit when receiving a signal during
this enumeration. This update checks the network prefix enumeration code
for interrupted system calls. Now, snmpd no longer terminates when a signal
is received. (BZ#799699)

  • snmpd used the wrong length of COUNTER64 values in the AgentX protocol.

As a consequence, snmpd could not decode two consecutive COUNTER64 values
in one AgentX packet. This update uses the correct COUNTER64 size and can
process two or mode COUNTER64 values in AgentX communication. (BZ#803585)

  • snmpd ignored the "-e" parameter of the "trapsess" option in the snmpd

configuration file. As a result, outgoing traps were incorrectly sent with
the default EngineID of snmpd when configuring "trapsess" with an explicit
EngineID. This update modifies the underlying code to send outgoing traps
using the EngineID as specified in the "trapsess -e" parameter in the
configuration file. (BZ#805689)

  • snmpd did not correctly encode negative Request-IDs in outgoing requests,

for example during trap operations. As a consequence, a 32-bit value could
be encoded in 5 bytes instead of 4, and the outgoing requests were refused
by certain implementations of the SNMP protocol as invalid. With this
update, a Request-ID can no longer become negative and is always encoded in
4 bytes. (BZ#818259)

  • snmpd ignored the port number of the "clientaddr" option when specifying

the source address of outgoing SNMP requests. As a consequence, the system
assigned a random address. This update allows to specify both the port
number and the source IP address in the "clientaddr" option. Now,
administrators can increase security with firewall rules and
Security-Enhanced Linux (SELinux) policies by configuring a specific source
port of outgoing traps and other requests. (BZ#828691)

  • snmpd did not correctly process responses to internal queries when

initializing monitoring enabled by the "monitor" option in the
"/etc/snmp/snmpd.conf" configuration file. As a consequence, snmpd was not
fully initialized and the error message "failed to run mteTrigger query"
appeared in the system log 30 seconds after the snmpd startup. This update
explicitly checks for responses to internal monitoring queries. (BZ#830042)

Users of net-snmp should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the update,
the snmpd and snmptrapd daemons will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 755958 - net-snmp ignores reiserfs formatted partitions
  • BZ - 803585 - agentx counter64 snmpget problem
  • BZ - 815813 - CVE-2012-2141 net-snmp: Array index error, leading to out-of heap-based buffer read (snmpd crash)
  • BZ - 840861 - snmpd does not report error when clientaddr <ip>:<port> cannot bind to the specified port

CVEs

  • CVE-2012-2141

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
net-snmp-5.3.2.2-20.el5.src.rpm SHA-256: 27befdbe811216f9679f2635ce508a4d0cf22afff905a87755e5a7c4843202bc
x86_64
net-snmp-5.3.2.2-20.el5.x86_64.rpm SHA-256: 11c40d833102a6ec79252403e0962d95b9d684f9b822dd6f63b4d350a02a3847
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-debuginfo-5.3.2.2-20.el5.x86_64.rpm SHA-256: e8af50abcbe8b8386d432c0c4f688b02dcd95fc6ae86b22120f1809bcfbfd196
net-snmp-devel-5.3.2.2-20.el5.i386.rpm SHA-256: 0581dba09d5a146feb3a2bfcffe1f0c00b668cd28edf8bda11c86dcd73551ee1
net-snmp-devel-5.3.2.2-20.el5.x86_64.rpm SHA-256: f3c291eb0353440fed4316d3dfcb623d48c93db4e9eeab63ef30bec544fb8aa2
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-libs-5.3.2.2-20.el5.x86_64.rpm SHA-256: 0ad2efa9fa8bd9be1d1133c150245697010f6ccd0ee092b6bbd17b7b007329d5
net-snmp-perl-5.3.2.2-20.el5.x86_64.rpm SHA-256: 47f68607f0e5a245f2e2913499d0097862379afffd09854c2af7c773da57fbe5
net-snmp-utils-5.3.2.2-20.el5.x86_64.rpm SHA-256: a2522eac2cd8d8ed0af9bd5e52b304d98b7830df242b6713ead589c459e265d4
ia64
net-snmp-5.3.2.2-20.el5.ia64.rpm SHA-256: 61d83f4750204a148ee11a7ecef1d67220a6849d80d8c611deab72c0bc733c70
net-snmp-debuginfo-5.3.2.2-20.el5.ia64.rpm SHA-256: d9282e7593055a2eabe53b6de1127524d845f4d57cf060f5261d246890a8c897
net-snmp-devel-5.3.2.2-20.el5.ia64.rpm SHA-256: fb35f9911ef6d7ba322a478de8b150db36fa807104910f0f420cb262b891545c
net-snmp-libs-5.3.2.2-20.el5.ia64.rpm SHA-256: 870352d30d2f956fcca664a1c2562bf2553032eaca195985ef2a752d0a9a88c2
net-snmp-perl-5.3.2.2-20.el5.ia64.rpm SHA-256: c15a1d9c2e6746d023b5594206790f84acbea7e5a8671408acbdc943295388be
net-snmp-utils-5.3.2.2-20.el5.ia64.rpm SHA-256: bba283d548b2d2d82f57a6e9a4723da24ee3c1002536feb2c0341a66ee47c19e
i386
net-snmp-5.3.2.2-20.el5.i386.rpm SHA-256: 837294254be9c9c2d8e9eca9b714a4bd807a4cd50a11c798c395f94691f417f9
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-devel-5.3.2.2-20.el5.i386.rpm SHA-256: 0581dba09d5a146feb3a2bfcffe1f0c00b668cd28edf8bda11c86dcd73551ee1
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-perl-5.3.2.2-20.el5.i386.rpm SHA-256: 14cbdb17d0fcc768370e24a9de3b839e28b23f9a30d5d43f6d9d6121b231b99d
net-snmp-utils-5.3.2.2-20.el5.i386.rpm SHA-256: a0c47371af607378c75704e8dd719800954815e9cde1360c4b2791a43f24ab61

Red Hat Enterprise Linux Workstation 5

SRPM
net-snmp-5.3.2.2-20.el5.src.rpm SHA-256: 27befdbe811216f9679f2635ce508a4d0cf22afff905a87755e5a7c4843202bc
x86_64
net-snmp-5.3.2.2-20.el5.x86_64.rpm SHA-256: 11c40d833102a6ec79252403e0962d95b9d684f9b822dd6f63b4d350a02a3847
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-debuginfo-5.3.2.2-20.el5.x86_64.rpm SHA-256: e8af50abcbe8b8386d432c0c4f688b02dcd95fc6ae86b22120f1809bcfbfd196
net-snmp-debuginfo-5.3.2.2-20.el5.x86_64.rpm SHA-256: e8af50abcbe8b8386d432c0c4f688b02dcd95fc6ae86b22120f1809bcfbfd196
net-snmp-devel-5.3.2.2-20.el5.i386.rpm SHA-256: 0581dba09d5a146feb3a2bfcffe1f0c00b668cd28edf8bda11c86dcd73551ee1
net-snmp-devel-5.3.2.2-20.el5.x86_64.rpm SHA-256: f3c291eb0353440fed4316d3dfcb623d48c93db4e9eeab63ef30bec544fb8aa2
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-libs-5.3.2.2-20.el5.x86_64.rpm SHA-256: 0ad2efa9fa8bd9be1d1133c150245697010f6ccd0ee092b6bbd17b7b007329d5
net-snmp-perl-5.3.2.2-20.el5.x86_64.rpm SHA-256: 47f68607f0e5a245f2e2913499d0097862379afffd09854c2af7c773da57fbe5
net-snmp-utils-5.3.2.2-20.el5.x86_64.rpm SHA-256: a2522eac2cd8d8ed0af9bd5e52b304d98b7830df242b6713ead589c459e265d4
i386
net-snmp-5.3.2.2-20.el5.i386.rpm SHA-256: 837294254be9c9c2d8e9eca9b714a4bd807a4cd50a11c798c395f94691f417f9
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-devel-5.3.2.2-20.el5.i386.rpm SHA-256: 0581dba09d5a146feb3a2bfcffe1f0c00b668cd28edf8bda11c86dcd73551ee1
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-perl-5.3.2.2-20.el5.i386.rpm SHA-256: 14cbdb17d0fcc768370e24a9de3b839e28b23f9a30d5d43f6d9d6121b231b99d
net-snmp-utils-5.3.2.2-20.el5.i386.rpm SHA-256: a0c47371af607378c75704e8dd719800954815e9cde1360c4b2791a43f24ab61

Red Hat Enterprise Linux Desktop 5

SRPM
net-snmp-5.3.2.2-20.el5.src.rpm SHA-256: 27befdbe811216f9679f2635ce508a4d0cf22afff905a87755e5a7c4843202bc
x86_64
net-snmp-5.3.2.2-20.el5.x86_64.rpm SHA-256: 11c40d833102a6ec79252403e0962d95b9d684f9b822dd6f63b4d350a02a3847
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-debuginfo-5.3.2.2-20.el5.x86_64.rpm SHA-256: e8af50abcbe8b8386d432c0c4f688b02dcd95fc6ae86b22120f1809bcfbfd196
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-libs-5.3.2.2-20.el5.x86_64.rpm SHA-256: 0ad2efa9fa8bd9be1d1133c150245697010f6ccd0ee092b6bbd17b7b007329d5
net-snmp-perl-5.3.2.2-20.el5.x86_64.rpm SHA-256: 47f68607f0e5a245f2e2913499d0097862379afffd09854c2af7c773da57fbe5
net-snmp-utils-5.3.2.2-20.el5.x86_64.rpm SHA-256: a2522eac2cd8d8ed0af9bd5e52b304d98b7830df242b6713ead589c459e265d4
i386
net-snmp-5.3.2.2-20.el5.i386.rpm SHA-256: 837294254be9c9c2d8e9eca9b714a4bd807a4cd50a11c798c395f94691f417f9
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-perl-5.3.2.2-20.el5.i386.rpm SHA-256: 14cbdb17d0fcc768370e24a9de3b839e28b23f9a30d5d43f6d9d6121b231b99d
net-snmp-utils-5.3.2.2-20.el5.i386.rpm SHA-256: a0c47371af607378c75704e8dd719800954815e9cde1360c4b2791a43f24ab61

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
net-snmp-5.3.2.2-20.el5.src.rpm SHA-256: 27befdbe811216f9679f2635ce508a4d0cf22afff905a87755e5a7c4843202bc
s390x
net-snmp-5.3.2.2-20.el5.s390x.rpm SHA-256: 38e747dfc3cd72a7e5e7e1845eb81124b69c1a5fd7d7a24496a510bb4b25f817
net-snmp-debuginfo-5.3.2.2-20.el5.s390.rpm SHA-256: 681251a8dc3f733b2c6f06f89d2137879a6e270f50c63197a6c8fcc73c7af1ef
net-snmp-debuginfo-5.3.2.2-20.el5.s390x.rpm SHA-256: 71c7fb74c3d0bdd49a7ccc7b220aff7e061e48f5d17c100aa1cb192d21115f44
net-snmp-devel-5.3.2.2-20.el5.s390.rpm SHA-256: 464ad41ea74c5821da2791e6d70bdad58b0f7a090ee87b5dc2568144595e6185
net-snmp-devel-5.3.2.2-20.el5.s390x.rpm SHA-256: b70d7f6a10c354ce336d05d615afa20f8ea9f1e1fd5c001717e64ecec49275d2
net-snmp-libs-5.3.2.2-20.el5.s390.rpm SHA-256: 3f8a2de0e006ec0570b24773a8672f1dcb984521b3f6a409c7ed8dbd208e57a2
net-snmp-libs-5.3.2.2-20.el5.s390x.rpm SHA-256: 6252da23a4db7e0c14fa192b3bbf1d279425543365193028cfd67b54aa38258a
net-snmp-perl-5.3.2.2-20.el5.s390x.rpm SHA-256: 9061708beb6c4e83fda55bba76419d2480c787929b00f6461af3b0aaa8b378d2
net-snmp-utils-5.3.2.2-20.el5.s390x.rpm SHA-256: 436a2126cd82b2e4ff716eeeb70371a777ec9c0948e48ba5bd72b363c539a08d

Red Hat Enterprise Linux for Power, big endian 5

SRPM
net-snmp-5.3.2.2-20.el5.src.rpm SHA-256: 27befdbe811216f9679f2635ce508a4d0cf22afff905a87755e5a7c4843202bc
ppc
net-snmp-5.3.2.2-20.el5.ppc.rpm SHA-256: 5c7ed11dfc030ee3d7a9838c8a51d0ca987aaa0f45b6e48112e542d6925082ef
net-snmp-debuginfo-5.3.2.2-20.el5.ppc.rpm SHA-256: 6b647b2f8558ecbfec7da79bc320a547a4637f33560697fb6379c793917c53c2
net-snmp-debuginfo-5.3.2.2-20.el5.ppc64.rpm SHA-256: 955a40b907bcba0d5173ff797677e57be3df1e614126adf927d7a71e08347e4d
net-snmp-devel-5.3.2.2-20.el5.ppc.rpm SHA-256: 2b8dd2e6d33038dae08b44ef13a7f51eccb7d47b20e694193e3437f85c1ba3b0
net-snmp-devel-5.3.2.2-20.el5.ppc64.rpm SHA-256: cee79bb939347a7c60d4add56f1d824a2e7dd71cfc114931407ddf546c4fb035
net-snmp-libs-5.3.2.2-20.el5.ppc.rpm SHA-256: d424432972fc2ab360318369ffd3956c4e993ad4d0f0b03f34817ecf06aed9a5
net-snmp-libs-5.3.2.2-20.el5.ppc64.rpm SHA-256: 368418603fa6563400571960cbcaaa9700808ba024e91cc25ebec5fd48506fcc
net-snmp-perl-5.3.2.2-20.el5.ppc.rpm SHA-256: 74582d71e6d4c6b35ed23e0d0c2d0082ee5e41f246f84960d4d97bfd37920ca5
net-snmp-utils-5.3.2.2-20.el5.ppc.rpm SHA-256: 2ac9742dd81fcdbc472eb3d40e80d9cd76d27dcd65f0f3361625e6abc884f0f6

Red Hat Enterprise Linux Server from RHUI 5

SRPM
net-snmp-5.3.2.2-20.el5.src.rpm SHA-256: 27befdbe811216f9679f2635ce508a4d0cf22afff905a87755e5a7c4843202bc
x86_64
net-snmp-5.3.2.2-20.el5.x86_64.rpm SHA-256: 11c40d833102a6ec79252403e0962d95b9d684f9b822dd6f63b4d350a02a3847
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-debuginfo-5.3.2.2-20.el5.x86_64.rpm SHA-256: e8af50abcbe8b8386d432c0c4f688b02dcd95fc6ae86b22120f1809bcfbfd196
net-snmp-devel-5.3.2.2-20.el5.i386.rpm SHA-256: 0581dba09d5a146feb3a2bfcffe1f0c00b668cd28edf8bda11c86dcd73551ee1
net-snmp-devel-5.3.2.2-20.el5.x86_64.rpm SHA-256: f3c291eb0353440fed4316d3dfcb623d48c93db4e9eeab63ef30bec544fb8aa2
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-libs-5.3.2.2-20.el5.x86_64.rpm SHA-256: 0ad2efa9fa8bd9be1d1133c150245697010f6ccd0ee092b6bbd17b7b007329d5
net-snmp-perl-5.3.2.2-20.el5.x86_64.rpm SHA-256: 47f68607f0e5a245f2e2913499d0097862379afffd09854c2af7c773da57fbe5
net-snmp-utils-5.3.2.2-20.el5.x86_64.rpm SHA-256: a2522eac2cd8d8ed0af9bd5e52b304d98b7830df242b6713ead589c459e265d4
i386
net-snmp-5.3.2.2-20.el5.i386.rpm SHA-256: 837294254be9c9c2d8e9eca9b714a4bd807a4cd50a11c798c395f94691f417f9
net-snmp-debuginfo-5.3.2.2-20.el5.i386.rpm SHA-256: ee101da988c624bde781e19f88eaf45b2e044dc13ac693f37cf61f2808a14e5c
net-snmp-devel-5.3.2.2-20.el5.i386.rpm SHA-256: 0581dba09d5a146feb3a2bfcffe1f0c00b668cd28edf8bda11c86dcd73551ee1
net-snmp-libs-5.3.2.2-20.el5.i386.rpm SHA-256: d18c9d4478ad1315e66671814be8271b9d931f685be5912eff898ce970f50a3d
net-snmp-perl-5.3.2.2-20.el5.i386.rpm SHA-256: 14cbdb17d0fcc768370e24a9de3b839e28b23f9a30d5d43f6d9d6121b231b99d
net-snmp-utils-5.3.2.2-20.el5.i386.rpm SHA-256: a0c47371af607378c75704e8dd719800954815e9cde1360c4b2791a43f24ab61

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility